2009 Sixth International Conference on Information Technology: New Generations最新文献

筛选
英文 中文
Security Vulnerabilities and Mitigation Strategies for Application Development 应用程序开发的安全漏洞和缓解策略
Brunil Dalila Romero Marino, Hisham M. Haddad
{"title":"Security Vulnerabilities and Mitigation Strategies for Application Development","authors":"Brunil Dalila Romero Marino, Hisham M. Haddad","doi":"10.1109/ITNG.2009.151","DOIUrl":"https://doi.org/10.1109/ITNG.2009.151","url":null,"abstract":"Anticipating and mitigating security threats is critical during software development. This work investigates security vulnerabilities and mitigation strategies to help software developers build secure applications. The work examines common vulnerabilities, and relevant mitigation strategies, from several perspectives, including the input environment used to supply the software with needed data, the internal data and structures used to store and retrieve the data, the algorithms and computations performed on the data, the outputs, and the extensibility and mobile software. Examining software security from these vantage points is the key to understanding the difficulty of producing secure software applications.","PeriodicalId":347761,"journal":{"name":"2009 Sixth International Conference on Information Technology: New Generations","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128335934","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Software Engineering Challenges in Game Development 游戏开发中的软件工程挑战
Christopher M. Kanode, Hisham M. Haddad
{"title":"Software Engineering Challenges in Game Development","authors":"Christopher M. Kanode, Hisham M. Haddad","doi":"10.1109/ITNG.2009.74","DOIUrl":"https://doi.org/10.1109/ITNG.2009.74","url":null,"abstract":"In Software Engineering (SE), video game development is unique yet similar to other software endeavors. It is unique in that it combines the work of teams covering multiple disciplines (art, music, acting, programming, etc.), and that engaging game play is sought after through the use of prototypes and iterations. With that, game development is faced with challenges that can be addressed using traditional SE practices. The industry needs to adopt sound SE practices for their distinct needs such as managing multimedia assets and finding the “fun” in game play. The industry must take on the challenges by evolving SE methods to meet their needs. This work investigates these challenges and highlights engineering practices to mitigate these challenges.","PeriodicalId":347761,"journal":{"name":"2009 Sixth International Conference on Information Technology: New Generations","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128577835","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 114
Systematic and Formal Approach to get a Domain Specific Language 获得领域特定语言的系统和形式化方法
F. S. Marcondes, D. Fernandes, Denis Ávila Montini, P. M. Tasinaffo, Í. S. Vega, L. Dias
{"title":"Systematic and Formal Approach to get a Domain Specific Language","authors":"F. S. Marcondes, D. Fernandes, Denis Ávila Montini, P. M. Tasinaffo, Í. S. Vega, L. Dias","doi":"10.1109/ITNG.2009.265","DOIUrl":"https://doi.org/10.1109/ITNG.2009.265","url":null,"abstract":"This paper presents a systematic approach applied over State Machine (since it is a wide know model and easy to be used to formal specification) to improve the domain analysis procedure, besides been out of scope of this paper, this approach can also helps to improve the enterprise's business process as well. The motivation which leads to the this paper is how to got a Domain Specific Language (DSL) that is completely correspondent to a Domain Analysis sharing both the same business rules. This is a very important property to be achieved since a DSL must be used to help the codding procedure in a specific domain, so, it must be a direct relation over them and this relation is explored in this paper. It has a briefly discussion over the need for formalization procedures concluding that too much formalization can be a problem and lack of it can also be, so, formal transformations can be performed at mark point (as baselines or any other mark that can be defined) bringing important contributions to the rigor of the model improving it.","PeriodicalId":347761,"journal":{"name":"2009 Sixth International Conference on Information Technology: New Generations","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128664122","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Model for National E-readiness Assessment Based on System Approach 基于系统方法的国家电子战备评估模型
Elham Ziaei Pour, A. Taghizadeh, F. Bazazan, F. Khoshalhan, Ayoub Mohammadian
{"title":"A Model for National E-readiness Assessment Based on System Approach","authors":"Elham Ziaei Pour, A. Taghizadeh, F. Bazazan, F. Khoshalhan, Ayoub Mohammadian","doi":"10.1109/ITNG.2009.206","DOIUrl":"https://doi.org/10.1109/ITNG.2009.206","url":null,"abstract":"Main goal of this research is proposing an innovative scientific model for nationwide e-readiness assessment, proposed model including several levels, aim to reach the success factors and target customer groups, with enabling values. Through the research and from systematic point of view, e-readiness is a concept which includes all environmental effects, incoming, processing and outgoing phases of a national system. Value creation is another concept which includes all the outcomes and impacts of ICT adoption in the heart of e-Readiness and plays an important role in E-readiness assessment process. This comprehensive look to the ICT makes sense if we consider a system more e-Ready when it has more e-Ready incomes, process and outcomes than its competitors and eventually with increasing its adoption, makes more effective results in Business, government, citizenship, macro-economy, social, cultural and political aspects of the community. One of the advantages of proposed model is strongly attention to the role of specific countries features in national, industrial, organizational and individuals level to make proper assessment of e-Readiness and provide better opportunities with emphasis on E-business with special attention to the e-service adoption, and impacts of deploying these services in society","PeriodicalId":347761,"journal":{"name":"2009 Sixth International Conference on Information Technology: New Generations","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124611367","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Quantum Cryptography: A New Generation of Information Technology Security System 量子密码学:新一代信息技术安全体系
M. Sharbaf
{"title":"Quantum Cryptography: A New Generation of Information Technology Security System","authors":"M. Sharbaf","doi":"10.1109/ITNG.2009.173","DOIUrl":"https://doi.org/10.1109/ITNG.2009.173","url":null,"abstract":"Quantum cryptography is an emerging technology in which two parties can secure network communications by applying the phenomena of quantum physics. The security of these transmissions is based on the inviolability of the laws of quantum mechanics. Quantum cryptography was born in the early seventies when Steven Wiesner wrote \"Conjugate Coding\", which took more than ten years to end this paper. The quantum cryptography relies on two important elements of quantum mechanics - the Heisenberg Uncertainty principle and the principle of photon polarization. The Heisenberg Uncertainty principle states that, it is not possible to measure the quantum state of any system without distributing that system. The principle of photon polarization states that, an eavesdropper can not copy unknown qubits i.e. unknown quantum states, due to no-cloning theorem which was first presented by Wootters and Zurek in 1982. This research paper concentrates on the theory of  quantum cryptography, and how this technology contributes to the network security. This research paper summarizes the current state of quantum cryptography, and the real–world application implementation of this technology, and finally the future direction in which the quantum cryptography is headed forwards.","PeriodicalId":347761,"journal":{"name":"2009 Sixth International Conference on Information Technology: New Generations","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126902700","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 54
Derivation and Analysis of Link/Route Maintenance Probability In Multi Hop Mobile Ad Hoc Networks 多跳移动Ad Hoc网络中链路/路由维护概率的推导与分析
Y. Wu, Do Hyeon Lee, Jae-il Jung
{"title":"Derivation and Analysis of Link/Route Maintenance Probability In Multi Hop Mobile Ad Hoc Networks","authors":"Y. Wu, Do Hyeon Lee, Jae-il Jung","doi":"10.1109/ITNG.2009.87","DOIUrl":"https://doi.org/10.1109/ITNG.2009.87","url":null,"abstract":"In this paper, the link maintenance probability that the two relay nodes in mobile ad hoc networks (Manet) communicates for a certain time was derived according to the initial distance between two relay node and speed of each node. Based on the link maintenance probability we further derived the route maintenance probability in multi hop Manet when the distance between source and destination node is given. Finally, we used Matlab to analyze the impact of distance between two adjacent relay nodes and communication time on link and route maintenance probability.","PeriodicalId":347761,"journal":{"name":"2009 Sixth International Conference on Information Technology: New Generations","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130643422","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Extending the Pair Programming Pedagogy to Support Remote Collaborations in CS Education 扩展结对编程教学法以支持计算机科学教育中的远程协作
A. Shaw
{"title":"Extending the Pair Programming Pedagogy to Support Remote Collaborations in CS Education","authors":"A. Shaw","doi":"10.1109/ITNG.2009.288","DOIUrl":"https://doi.org/10.1109/ITNG.2009.288","url":null,"abstract":"Pair programming has been shown to have demonstrable benefits in computer science education at collegiate levels.  However, because it is an approach that involves two programmers working collaboratively at one computer, the model does not work as well when a project involves remote collaborators, or with teams of more than two students.  In this paper, I outline an approach that is more appropriate for remote collaborations and that can involve teams with more than two members.  Another problematic issue with pair programming is that one student in the pair can end up completing the lion’s share of a programming task even though during pair programming sessions students are supposed to voluntarily follow rules that equalize the programming effort.  The remote approach outlined here involves a client-server management model that alleviates the problem of how to ensure a more equitable distribution of the collaborative tasks.","PeriodicalId":347761,"journal":{"name":"2009 Sixth International Conference on Information Technology: New Generations","volume":"36 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114115168","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
The State of Play in Jordanian E-government Services 约旦电子政务服务的发展现状
M. Btoush, J. Siddiqi, Ja'far Alqatawna, Babak Akhgar
{"title":"The State of Play in Jordanian E-government Services","authors":"M. Btoush, J. Siddiqi, Ja'far Alqatawna, Babak Akhgar","doi":"10.1109/ITNG.2009.115","DOIUrl":"https://doi.org/10.1109/ITNG.2009.115","url":null,"abstract":"This paper presents the major Information and Communication Technology (ICT) initiatives that have been taking place in Jordan and their effect in creating and promoting an e-culture within the Jordanian society. This is followed by an analysis of the Jordanian public e-services’ state of play using a previously proposed conceptual framework, the 6I maturity model, as a benchmark to gauge the maturity stage of these e-services, and to assess their perceptual effectiveness. This analysis is a part of a major field study which explores the perceptions of users’ and providers’ of the Jordanian public e-services. Overall, this paper concludes that most of the public e-services in Jordan are still in an early stage, and with the exception of a very few e-services, most of them have not obtained many of the expected outcomes that the rhetoric of national strategies has promised. Moreover, the study has confirmed through empirical investigation using the 6I maturity model that eservices do not necessarily evolve in stages of maturity as suggested by traditional maturity models.","PeriodicalId":347761,"journal":{"name":"2009 Sixth International Conference on Information Technology: New Generations","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114194684","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
VL-MAC: Virtual Link Based Multi-channel MAC Scheme in WSN VL-MAC:基于虚拟链路的WSN多通道MAC方案
Luo Juan, Luo Hai-bo, Li Ren-fa
{"title":"VL-MAC: Virtual Link Based Multi-channel MAC Scheme in WSN","authors":"Luo Juan, Luo Hai-bo, Li Ren-fa","doi":"10.1109/ITNG.2009.191","DOIUrl":"https://doi.org/10.1109/ITNG.2009.191","url":null,"abstract":"Multi-channel medium access control can fully utilize frequency resources of PHY layer, which can reduce interference and improve throughput. Aimed at clustered network, A virtual link based multi-channel MAC (VL-MAC) is  proposed, which combines TDMA and FDMA. In VL-MAC, Cluster-heads schedule time-slots to achieve non-collision during intra-cluster communication. Inter-cluster communication between cluster heads is based on “Common Channel Link (virtual link, VL)”. Virtual MIMO is also employed to solve severe collision problem induced by enormous data around Sink node. The simulation indicates interference, latency and energy consumption can be reduced in VL-MAC.","PeriodicalId":347761,"journal":{"name":"2009 Sixth International Conference on Information Technology: New Generations","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114007150","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Hybrid Reconfiguration Algorithm for Fast Continuous Query Processing 一种快速连续查询处理的混合重构算法
Christopher Kosecki, Joseph S. Gomes
{"title":"A Hybrid Reconfiguration Algorithm for Fast Continuous Query Processing","authors":"Christopher Kosecki, Joseph S. Gomes","doi":"10.1109/ITNG.2009.223","DOIUrl":"https://doi.org/10.1109/ITNG.2009.223","url":null,"abstract":"With increasing hardware capabilities and network capacity, applications operating on streams of data are becoming more prevalent in the computing industry. Used in areas from security such as packet-sniffing intrusion detection software packages to the financial world attempting to model the stock market to map out future trends, algorithms for processing these unbounded streams are growing in necessity. Traditional database management systems fall short, as they are limited to bounded data. Therefore, stream management systems are required, as well as algorithms to efficiently process these data streams. Furthermore, these algorithms must be agile, adaptive and suitable for a wide range of operating conditions. In this paper, we design a hybrid algorithm to find optimized join trees for continuous stream queries. Our experimental results show that this hybrid algorithm can generate more efficient join trees than its components under a wide range of varied conditions.","PeriodicalId":347761,"journal":{"name":"2009 Sixth International Conference on Information Technology: New Generations","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126432006","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信